mission-critical applicationsdownload.microsoft.com/documents/australia/heroes/sql... · 2018. 12....

33

Upload: others

Post on 09-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security
Page 2: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

{ Mission-Critical Applications }

Nick WardApplication Platform and Development SpecialistMicrosoft [email protected]

Page 3: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

2008

2005

Trusted

Easy to Use

Business Intelligence

2000

7.0

Ease of use

Page 4: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Dynamic Development

Beyond Relational

Pervasive Insight

Enterprise Data Platform

Mobile andDesktop

OLAP

FILE

XML

RDBMS

Services

Query

Analysis

Reporting Integration

Synch

Search

CloudServer

Page 5: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Managing increasing IT and regulatory requirements

Meeting SLAs for system availability

Ensuring performance as load increases

Page 6: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Optimize performance

Manage mixed workloads

Scale performance

Ensure system availability

Minimize planned downtime

Concurrent data access

Secure data access

Protect your system

Simplify compliance

Mission-Critical Applications

Page 7: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Secure data access

Protect your system

Simplify compliance

Mission-Critical Applications

Page 8: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Highly secure data accessHighly secure configuration

Rich authentication

Granular authorization

Help protect your dataTransparent data encryption

Extensible key management

Simplify complianceAll actions auditable

Enterprise-wide security policies

Page 9: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Encrypt data and log files

Transparent to application

Secure with Database Encryption Key (DEK)

Use encrypted data in another server

Transparent data encryption

SQL Server 2008

DEK

Client Application

Encrypted Data Page

Page 10: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Extensible key management

Simplify key management

Consolidate and simplify encryption across

the enterprise

Store keys in removable hardware such as USB drives

Page 11: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Help protect your data with transparent data encryption

Applications do not need to be aware of the encryption

Data is highly protected because encrypted database files cannot be read without the Database Encryption Key

Encryption keys can be exported and imported to trusted servers

{ Protect Data Access }

Page 12: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

What data was

modified, and by

whom?

How many

failed log-

in

attempts?

Who has viewed

sensitive records

recently?

Enhanced auditing

Page 13: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Enhanced auditing

Audit all events on a server, or filter as appropriate

Different audit levels database or server

Multi-server auditing deployment and collection

Log To various formats (file, Windows the Windows Application Log, or the Windows Security Log)

Page 14: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Enterprise security policies

Define audit, access policies by using Policy Based Management

Authentication standard

Password policies

Define surface area configurations as policies

Apply across the enterprise

Using Configuration Servers

Helps to ensure enterprise-wide compliance

Page 15: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Simplify ComplianceSecure Access

Trustworthy Computing

Granular Authorization

Data Encryption

Rich AuthenticationAuditing

Secure Configurations

Protect Data

Principals and Securables

Roles

Catalog Security

Execution Context

User SchemaSeparation

Kerberos/NTLM

Password Policy Enforcement

End Point Authentication

Encrypted Login Credentials

Single Sign-On

Native Cryptographic Capabilities

Transparent Data Encryption

Extensible Key Management

Enterprise-wide Security Policies

Security Updates

Surface Area Minimized

All Actions Audited

Audit Actions to File, Windows Application Log, and Windows Security log

Capture and Audit DDL Activities

Page 16: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Optimize performance

Manage mixed workloads

Scale performance

Ensure system availability

Minimize planned downtime

Concurrent data access

Secure data access

Protect your system

Simplify compliance

Mission-Critical Applications

Page 17: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Ensure system availability

Minimize planned downtime

Concurrent data access

Mission-Critical Applications

Page 18: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Help ensure system availability

Failover clustering

Database mirroring

Log shipping

Replication

Minimize planned downtime

Backup compression

Dynamically add resources

Online operations

Enhance concurrent data access

Database snapshots

Snapshot isolation levels

Page 19: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Failover clustering

Windows Server 2008 Clustering

Supports up to 16-node clusters

More than 1 drive letter per clustered SQL Server instance

Nodes can be on different subnets

Supports an OR relationship between dependencies (e.g. server name resource available when either IP address is available)

Windows Server 2008 Cluster Validation Tool

Quorum disk no longer a single point of failure

Page 20: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Database mirroring

Performance improvements

Log compression

Automatic page repairPrevents a corrupt data page from making a database unavailable

Mirroring partner detects bad database page

Requests valid copy from partner

Log Stream compression

Page 21: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Principal

Witness

DataLog

Mirror

Data Log

Automatic page repair

1. Bad Page

Detected

X

2. Request page

3. Find page

4. Retrieve page

5. Transfer page

6. Write Page

Page 22: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Peer-to-peer replication

Add and remove nodes without stopping

Visual configuration with Topology Wizard

Ability to detect conflicts

Improved Replication Monitor

Select columns and filter rows for viewing

Page 23: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Backup compressionStandard backup commands and interface

Off by default,configurable

Restore from any SQL Server 2008 Edition

Dynamicallyadd resources

Online-Add CPU

Online-Add memory

0

1

2

3

4

5

6

Backup Size

Backup Time

Restore Time

No Compression

Compression

Backup Compression

Page 24: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

{ Ensure System Availability }

Using backup compressionIncreases database availability by reducing backup time

Easy to use and configure

Backup compression ratio is easily calculated

Can be used for initializing database mirroring and Log Shipping

Exploring database mirroringAutomatic page repair can prevent damaged pages from making a database unavailable

Page 25: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Optimize performance

Manage mixed workloads

Scale performance

Ensure system availability

Minimize planned downtime

Concurrent data access

Secure data access

Protect your system

Simplify compliance

Mission-Critical Applications

Page 26: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Optimize performance

Manage mixed workloads

Scale performance

Mission-Critical Applications

Page 27: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Optimize performance

Data compression

Enhanced partitioning

DW query optimizations

Improved indexed views

Performance data collection(covered in manageability session)

Manage mixed workloads

Resource Governor

Page 28: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Exec Reports

Reporting

Workload

Resource Governor

Resource Management

Allocate resources

Assign logins to workloads

Map workloads to resources

Define limits

Prevent run-away queries

Conduct online maintenance

Prioritize your workloads

Define priorities

Dynamic re-allocation

TransactionProcessing

Ad-hoc Reporting

Ad-hoc

Workload

OLTP

Workload

High PriorityPool

Low Priority Pool

Min Memory 10%

Max Memory 20%

Max CPU 20%Max CPU 90%

Batch Reports

Page 29: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

{ Manage Mixed Workloads }

Using Resource GovernorConfigure the Resource Governor by using T-SQL and Management Studio

Monitor the Resource Governor by using Management Studio and DMVs

Change resource pool limits online and observe the change

Page 30: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

16C

479

tpsE

64C

1,126

tpsE

TPC-E

16C

34,000

users

18,000

users

64C

63,650

QphH

TPC-H10TB

16C

419

tpsE

on Windowson Industry Standard Servers

Results as of 2/27/08. IBM System x3850 M2 (w/ SQL Server 2005), 419 tpsE, 1,527 $/tpsE, available 12/7/07; IBM System x3850 M2

(w/ SQL Server 2008), 479 tpsE, 1,591 $/tpsE, available 8/30/08; NEC Express5800/1320Xf, 1,126 tpsE, 2,771 $/tpsE, available

8/30/08. Source: Transaction Processing Performance Council (www.tpc.org).

Results as of 2/27/08. HP Integrity

Superdome, 63,650 QphH@10TB, 38.54

$/QphH@10TB, available 8/30/08. Source:

Transaction Processing Performance Council

(www.tpc.org).

Highest performance on 4-socket Industry Standard Servers. Certification Number 2005030: SAP SD standard R/3 Enterprise 4.70 application benchmark certified on 6/27/05

with 18,000 SD benchmark users & comp. Certification Number 2008003: SAP SD standard SAP ERP 6.0 (2005) application benchmark in 3-Tier configuration certified on

02/26/08 with 34,000 SD benchmark users & comp. For more details, see www.sap.com/benchmark.

SAP Benchmarks: Certification Number 2005030: The SAP SD standard R/3 Enterprise 4.70 application benchmark performed on June 21, 2005 by HP in Redmond, WA, USA

was certified on June 27, 2005 with the following data: Number of benchmark users & comp.: 18,000 SD (Sales & Distribution) Average dialog response time: 1.87 seconds

Throughput: Fully Processed Order Line items/hour: 1,819,000 Dialog steps/hour: 5,457,000 SAPS: 90,950 Average DB request time (dia/upd): 0.052 sec / 0.066 sec CPU

utilization of database server: 85% CPU utilization of application servers: 67% (dia: 85%, upd: 19%, msg/enq: 29%) Operating System database server: Windows Server 2003

Enterprise Edition (64-bit) Operating System application servers: Windows Server 2003 Enterprise Edition (32-bit) RDBMS database server: SQL Server 2005 (64-bit) R/3

Release: 4.70 (32-bit) Total database disk space: 135 GB Configuration: Database server: HP ProLiant DL585, 4-way SMP, Dual-core AMD Opteron processor Model 875 (2.2

GHz), 128 KB L1 cache, 2 MB L2 cache, 32 GB main memory

SAP-SD3-tier

Page 31: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

Optimize performance

Manage mixed workloads

Scale performance

Ensure system availability

Minimize planned downtime

Concurrent data access

Secure data access

Protect your system

Simplify compliance

Mission-Critical Applications

Page 32: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

SQL Server User Group

http://www.sqlserver.org

TechEd 2008

Learn more about mission-critical applications

http://www.microsoft.com/sql/2008/solutions/oltp.mspx

Learn more about SQL Server 2008http://www.microsoft.com/sql/2008/default.mspx

Discover SQL Server 2008: Webcasts, Virtual Labs, and White Papershttp://www.microsoft.com/sql/2008/learning/default.mspx

SQL Server 2008 traininghttp://www.microsoft.com/learning/sql/2008/default.mspx

Download latest SQL Server CTPhttp://www.microsoft.com/sql/2008/prodinfo/download.mspx

Join the SQL PASS communityhttp://www.sqlpass.org

Page 33: Mission-Critical Applicationsdownload.microsoft.com/documents/australia/heroes/SQL... · 2018. 12. 5. · Encryption Extensible Key Management Enterprise-wide Security Policies Security

© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market

conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.

MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.